|
388 | 388 | ), |
389 | 389 | match_log=> { |
390 | 390 | error=> [ qr/Patternmatch"arg1" at FULL_REQUEST.*Patternmatch"arg2" at FULL_REQUEST/s,1 ], |
391 | | -debug=> [ qr/against FULL_REQUEST.*Targetvalue:"GET \/test.txt\?arg1=val1\&arg2=val2 HTTP\/1.1\\n\\nTE: deflate,gzip;q=0.3\\nConnection: TE, close\\nHost: localhost:8088\\nUser-Agent: ModSecurity Regression Tests\/1.2.3\\n\\n\\x00"/s,1], |
| 391 | +debug=> [ qr/against FULL_REQUEST.*Targetvalue:"GET \/test.txt\?arg1=val1\&arg2=val2 HTTP\/1.1\\n\\nTE: deflate,gzip;q=0.3\\nConnection: TE, close\\nHost: localhost:[0-9]+\\nUser-Agent: ModSecurity Regression Tests\/1.2.3\\n\\n\\x00"/s,1], |
392 | 392 | }, |
393 | 393 | match_response=> { |
394 | 394 | status=> qr/^200$/, |
|
411 | 411 | ), |
412 | 412 | match_log=> { |
413 | 413 | error=> [ qr/Patternmatch"arg1" at FULL_REQUEST.*Patternmatch"arg2" at FULL_REQUEST/s,1 ], |
414 | | -debug=> [ qr/against FULL_REQUEST.*Targetvalue:"POST \/test.txt HTTP\/1.1\\n\\nTE: deflate,gzip;q=0.3\\nConnection: TE, close\\nHost: localhost:8088\\nUser-Agent: ModSecurity Regression Tests\/1.2.3\\nContent-Type: application\/x-www-form-urlencoded\\nContent-Length: 19\\n\\narg1=val1&arg2=val2\\x00"/s,1 ], |
| 414 | +debug=> [ qr/against FULL_REQUEST.*Targetvalue:"POST \/test.txt HTTP\/1.1\\n\\nTE: deflate,gzip;q=0.3\\nConnection: TE, close\\nHost: localhost:[0-9]+\\nUser-Agent: ModSecurity Regression Tests\/1.2.3\\nContent-Type: application\/x-www-form-urlencoded\\nContent-Length: 19\\n\\narg1=val1&arg2=val2\\x00"/s,1 ], |
415 | 415 | }, |
416 | 416 | match_response=> { |
417 | 417 | status=> qr/^200$/, |
|